4710.00 руб.*

Do you want to learn how to create computer war games, but don?t know how to get started or don?t have any experience with game programming? Going to War: Creating Computer War Games shows you how to use the drag-and-drop game engine, Multimedia Fusion 2, to make your very own computer war games to play and share. After an introduction to the Multimedia Fusion 2 interface and the basics of how to use it, you?ll get started on the game that you?ll create throughout the course of the book. You?ll begin by making your game map, using a system of hexagon tiles to create the terrain and the different units you want to include in your game such as soldiers and tanks. Then you?ll learn how to set rules for player movement, different types of terrain, and combat. You?ll even find more advanced techniques such as how to implement officers, fortifications, and even a simple monetary system in your games. The book even discusses how to track and find bugs in your games and how to create an...

3137.00 руб.*

Google SketchUp is the exciting free software package that makes 3D available to everybody. Whether you need to build 3D models for work, or you’ve just always wanted to explore 3D modeling, Google SketchUp was made for you. Still, it does take a bit of understanding to get started, so turn to Google SketchUp 7 For Dummies. In classic For Dummies tradition, Google SketchUp 7 For Dummies gets right to the point so you can start creating 3D models right away. You’ll learn to: Set up SketchUp, learn about edges and faces, use inferences and guides, and build your first model Establish a basic end-to-end workflow for creating and sharing models Model non-boxy objects like terrain, characters, bottles, and spheres Add details like stairs, gutters, and eaves Spruce up your models with styles and shadows to add effects, make objects pop, and enhance realism Use the LayOut function to draw with vector tools, add text and callouts, and print your work...

4640.00 руб.*

Google SketchUp & SketchUp Pro Bible will target design professionals who are increasingly turning to SketchUp and SketchUp Pro to easily create professional quality designs and design presentations. This book will cover creating 2D and 3D designs, exporting models to Google Earth, and using LayOut to create professional quality design presentations. Offering everything that a professional or hobbyist needs to know, Google SketchUp and SketchUp Pro Bible will include tips and tricks to make using this software easy and efficient.

10378.00 руб.*

This book constitutes the proceedings of the 16th International Symposium on Graph Drawing, GD 2008, held in Heraklion, Crete, Greece, during September 21-24, 2008. The 31 long papers and 8 short papers presented together with 10 posters and two invited papers were carefully reviewed and selected from 83 submissions. The volume also includes a report on the Graph Drawing Contest which was held during the conference. An important aspect of the conference is bridging the gap between theoretical advances and implemented solutions of geometric representation of graphs and networks. It is motivated by those applications where it is crucial to visualize structural information as graphs.

12600.00 руб.*

Our daily interactions are based on recognizing people. As information technology advances, our interactions will be accomplished through newly designed interfaces, with a vital element being the automated process of recognition of a person’s real identity: Biometrics. In recent years, biometrics has moved from using fingerprints, to many different methods of assessing human physical and behavioural traits. This useful guide introduces a new performance evaluation framework designed to provide complete coverage of performance evaluation of major biometric systems. Two key areas are presented: The first gives a unique snapshot of the performance evaluation of various biometrics within a common evaluation framework (databases and protocols). The second presents a state-of-the-art benchmarking evaluation framework for use in future performance evaluations – comprised of open-source reference systems. Features and benefits: • Includes a Foreword by renowned biometric expert Prof. Anil...

2377.00 руб.*

• Lift the Fog of War with exclusive, full-color maps of all the Campaign and Multiplayer locations. With all choke points, each ambush location, and every supply crate, base point, and other pertinent location revealed.• Comprehensive, multi-layered tactics for the Campaign mode, including battle-tested plans for Cooperative play, and the fabled Legendary difficulty setting.• Create an impenetrable base—we show you how to correctly turn a poorly-defended Firebase into a Fortress, including what to build, and when.• Every single UNSC and Covenant troop, unit, vehicle, and aircraft is showcased, along with its upgrades, weaknesses, and advice on using it to your tactical advantage.• Every hidden Skull and Black Box located and tested, including a complete Halo timeline.• Packed with dozens of pages of the most awe-inspiring exclusive Halo art ever seen!

2449.00 руб.*

Robberies: Learn the tricks to execute the most complex bank robberies and make the great escape. Vehicles: Learn where and how to obtain every vehicle along with tables outlining all of their stats. Poster: Huge pullout map poster. The Crew: Maximize your potential with strategy to help you work effectively with your team. Dev Tips: Tips and tricks directly from the development team will help you master every heist!

8218.00 руб.*

This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using "Oracle 10g and 11g". It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it. Формат: 18 см x 26 см.

10240.00 руб.*

Under the aegis of Andrew Sears and Julie Jacko, expert practitioners address the myriad issues involved when designing the interactions between users and computing technologies. Derived from select chapters in The Human-Computer Interaction Handbook, this volume focuses on HCI from a privacy, security, and trust perspective. It explains how to reduce cognitive complexity by achieving psychological simplicity. Topics include adaptive interfaces, tangible interfaces, information visualization, designing for the web, and computer-supported cooperative work. As expected in a book that begins by pondering “Why we should think before doing”, readers get an interdisciplinary resource that improves their understanding of the relationship between people and technology.

10492.00 руб.*

Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking resource, Human-Computer Interaction: Designing for Diverse Users and Domains emphasizes design for users as such as children, older adults, and individuals with physical, cognitive, visual, and hearing impairments. It also discusses HCI in the context of specific domains including healthcare, games, and the aerospace industry. Topics include the role of gender in HCI, information technology and older adults, motor vehicle driver interfaces, and user-centered design in games. While human-computer interaction may have emerged from within computing, significant contributions have come from a variety of fields including industrial engineering, psychology, education, and graphic design. No where is this more apparent then when designing...

10204.00 руб.*

Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking resource, Human-Computer Interaction: The Development Practice addresses requirements specification, design and development, and testing and evaluation activities. It also covers task analysis, contextual design, personas, scenario-based design, participatory design, and a variety of evaluation techniques including usability testing, inspection-based and model-based evaluation, and survey design. The book includes contributions from eminent researchers and professionals from around the world who, under the guidance of editors Andrew Sear and Julie Jacko, explore visionary perspectives and developments that fundamentally transform the discipline and its practice.

5593.00 руб.*

Testing accounts for an increasingly large percentage of the time and cost of new software development. Using automated software testing (AST), developers and software testers can optimize the software testing lifecycle and thus reduce cost. As technologies and development grow increasingly complex, AST becomes even more indispensable. This book builds on some of the proven practices and the automated testing lifecycle methodology (ATLM) described in Automated Software Testing and provides a renewed practical, start-to-finish guide to implementing AST successfully. In Implementing Automated Software Testing, three leading experts explain AST in detail, systematically reviewing its components, capabilities, and limitations. Drawing on their experience deploying AST in both defense and commercial industry, they walk you through the entire implementation process - identifying best practices, crucial success factors, and key pitfalls along with solutions for avoiding them. You...

14906.00 руб.*

This book constitutes the refereed proceedings of the 8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, held in Paraty, Brazil, in March 2009. The 97 revised papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on theory, algorithms and architectures, biomedical applications, image processing, speech and audio processing, other applications, as well as a special session on evaluation.

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.